You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
Eclipse Jetty's PushSessionCacheFilter can cause remote DoS attacks
Low severity
GitHub Reviewed
Published
Oct 14, 2024
in
jetty/jetty.project
•
Updated Nov 3, 2025
The session usage is intrinsic to the design of the PushCacheFilter. The issue can be avoided by:
not using the PushCacheFilter. Push has been deprecated by the various IETF specs and early hints responses should be used instead.
reducing the reducing the idle timeout on unauthenticated sessions will reduce the time such session stay in memory.
configuring a session cache to use session passivation, so that sessions are not stored in memory, but rather in a database or file system that may have significantly more capacity than memory.
The product allocates a reusable resource or group of resources on behalf of an actor without imposing any intended restrictions on the size or number of resources that can be allocated.
Learn more on MITRE.
Impact
Jetty PushSessionCacheFilter can be exploited by unauthenticated users to launch remote DoS attacks by exhausting the server’s memory.
Patches
Workarounds
The session usage is intrinsic to the design of the PushCacheFilter. The issue can be avoided by:
References
References